[1] 许艳萍,马兆丰,王中华,等.Android智能终端安全综述[J].通信学报,2016,37(6):169-184.(XU Y P, MA Z F, WANG Z H, et al. Survey of security for Android smart terminal[J]. Journal on Communications, 2016, 37(6):169-184.) [2] ZHANG W, CAO C, LIU W, et al. Vulnerability mining techniques in Android platform[C]//Proceedings of the 1st International Workshop on Cloud Computing and Information Security. Paris:Atlantis Press, 2013:535-540. [3] SHABTAI A, FLEDEL Y, ELOVICI Y. Securing Android-powered mobile devices using SELinux[J]. IEEE Security and Privacy, 2010, 8(3):36-44. [4] AZAB A M, NING P, SHAH J, et al. Hypervision across worlds:real-time kernel protection from the ARM TrustZone secure world[C]//CCS'14:Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2014:90-102. [5] 郑显义,李文,孟丹.TrustZone技术的分析与研究[J].计算机学报,2016,39(9):1912-1928.(ZHENG X Y, LI W, MENG D. Analysis and research on TrustZone technology[J]. Chinese Journal of Computers, 2016, 39(9):1912-1928.) [6] SANTOS N, RAJ H, SAROIU S, et al. Using ARM trustzone to build a trusted language runtime for mobile applications[C]//ASPLOS'14:Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems. New York:ACM, 2014:67-80. [7] ZHANG D, CHEN L, XUE F, et al. T-MAC:protecting mandatory access control system integrity from malicious execution environment on ARM-based mobile devices[C]//Proceedings of the 2017 International Conference on Information Security, LNCS 10599. Berlin:Springer, 2017:348-365. [8] ZHAO S, ZHANG Q, HU G, et al. Providing root of trust for ARM TrustZone using on-chip SRAM[C]//TrustED'14:Proceedings of the 4th International Workshop on Trustworthy Embedded Devices. New York:ACM, 2014:25-36. [9] PINTO S, OLIVEIRA D, PEREIRA J, et al. Towards a lightweight embedded virtualization architecture exploiting ARM TrustZone[C]//ETFA'14:Proceedings of the 2014 IEEE Emerging Technology and Factory Automation. Piscataway, NJ:IEEE, 2015:1-4. [10] SUN H, SUN K, WANG Y, et al. TrustOTP:transforming smartphones into secure one-time password tokens[C]//CCS'15:Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2015:976-988. [11] 李舟军,沈东,苏晓菁,等.基于ARM虚拟化扩展的安全防护技术[J].软件学报,2017,28(9):2229-2247.(LI Z J, SHEN D, SU X J, et al. Security technology based on ARM virtualization extension[J]. Journal of Software, 2017, 28(9):2229-2247.) [12] DONG Y, YAO J, GUAN H, et al. MobiXen:porting Xen on Android devices for mobile virtualization[C]//DATE'17:Proceedings of the 2017 Design, Automation and Test in Europe Conference and Exhibition. Leuven, Belgium:European Design and Automation Association, 2017:946-949. [13] DALL C, NIEH J. KVM/ARM:the design and implementation of the Linux ARM hypervisor[C]//ASPLOS'14:Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems. New York:ACM, 2014:333-348. [14] LANGE M, LIEBERGELD S, LACKORZYNSKI A, et al. L4Android:a generic operating system framework for secure smartphones[C]//SPSM'11:Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. New York:ACM, 2011:39-50. [15] 杨永,钱振江,黄皓.一种轻量级的Android内核保护监控器[J].计算机工程,2014,40(4):48-52.(YANG Y, QIAN Z J, HUANG H. A lightweight monitor for Android kernel protection[J]. Computer Engineering, 2014, 40(4):48-52. |